Description | This article explains how FortiSASE handles route processing in scenarios where SSLVPN subnets overlap with SPA BGP routes. |
Scope | FortiSASE. |
Solution |
In FortiSASE, the IPAM configuration can be enabled: Region IP addresses
A FortiSASE instance supports unique IP address ranges for remote VPN and edge endpoints per FortiSASE security PoP using IPAM within the overall 100.65.0.0/16 range, by default. The below subnets from the following private IP pools are available:
The IP pools assigned to VPN and edge devices may overlap with SPA BGP routes, particularly within the 10.0.0.0/8 range.
To resolve this conflict, the excluded subnets must be modified to permit routing from the HUB. For example, the 10.128.0.0/16 is excluded:
config router bgp config router route-map end
config router prefix-list
From the BGP routing table:
FGT $ get router info bgp network VRF 10 BGP table version is 9, local router ID is 10.251.1.1 Network Next Hop Metric LocPrf Weight RouteTag Path Total number of prefixes 3
In the above example, the FortiSASE IPAM exclude subnets configuration creates a double 'deny' action in both the route map and the prefix list. Without this exclusion configuration, the BGP route will not be received. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.